package handlers import ( "crypto/ecdsa" "encoding/base64" "encoding/hex" "math" "testing" "github.com/nspcc-dev/neo-go/pkg/crypto/keys" "github.com/nspcc-dev/neofs-api-go/v2/acl" crypto "github.com/nspcc-dev/neofs-crypto" "github.com/nspcc-dev/neofs-rest-gw/gen/models" "github.com/nspcc-dev/neofs-rest-gw/internal/util" "github.com/nspcc-dev/neofs-sdk-go/user" "github.com/stretchr/testify/require" ) const devenvPrivateKey = "1dd37fba80fec4e6a6f13fd708d8dcb3b29def768017052f6c930fa1c5d90bbb" func TestSign(t *testing.T) { key, err := keys.NewPrivateKeyFromHex(devenvPrivateKey) require.NoError(t, err) pubKeyHex := hex.EncodeToString(key.PublicKey().Bytes()) records := []*models.Record{{ Operation: models.NewOperation(models.OperationPUT), Action: models.NewAction(models.ActionALLOW), Filters: []*models.Filter{}, Targets: []*models.Target{{ Role: models.NewRole(models.RoleOTHERS), Keys: []string{}, }}, }} btoken, err := util.ToNativeObjectToken(records) require.NoError(t, err) btoken.SetExp(math.MaxInt64) ownerKey, err := keys.NewPublicKeyFromString(pubKeyHex) require.NoError(t, err) var owner user.ID user.IDFromKey(&owner, *(*ecdsa.PublicKey)(ownerKey)) btoken.ForUser(owner) var v2token acl.BearerToken btoken.WriteToV2(&v2token) binaryBearer := v2token.GetBody().StableMarshal(nil) bearerBase64 := base64.StdEncoding.EncodeToString(binaryBearer) signatureData, err := crypto.Sign(&key.PrivateKey, binaryBearer) require.NoError(t, err) bt := &BearerToken{ Token: bearerBase64, Signature: hex.EncodeToString(signatureData), Key: pubKeyHex, } _, err = prepareBearerToken(bt, false, false) require.NoError(t, err) }